Difference between revisions of "GameSec 2021"

From OPENRESEARCH fixed Wiki
Jump to navigation Jump to search
(modified through wikirestore by orapi)
(modified through wikirestore by orapi)
Line 8: Line 8:
 
|has general chair=Branislav Bosansky, Cleotilde Gonzalez
 
|has general chair=Branislav Bosansky, Cleotilde Gonzalez
 
|Acronym =GameSec 2021
 
|Acronym =GameSec 2021
|End date=2021/10/27
+
|End date=2021-10-27
 
|Series  =GameSec
 
|Series  =GameSec
 
|presence=online
 
|presence=online
Line 15: Line 15:
 
|State  =CZ/10
 
|State  =CZ/10
 
|City    =CZ/10/Prague
 
|City    =CZ/10/Prague
 +
|Year    =2021
 
|Homepage=https://www.gamesec-conf.org/
 
|Homepage=https://www.gamesec-conf.org/
 
|Ordinal =12
 
|Ordinal =12
|Start date=2021/10/25
+
|Start date=2021-10-25
 
|Title  =Conference on Decision and Game Theory for Security
 
|Title  =Conference on Decision and Game Theory for Security
 
|wikicfpId=133363}}
 
|wikicfpId=133363}}

Revision as of 02:39, 19 November 2021


Event Rating

median worst
Pain2.svg Pain5.svg

List of all ratings can be found at GameSec 2021/rating

GameSec 2021
Conference on Decision and Game Theory for Security
Ordinal 12
Event in series GameSec
Dates 2021-10-25 (iCal) - 2021-10-27
Presence online
Homepage: https://www.gamesec-conf.org/
Submitting link: https://easychair.org/conferences/?conf=gamesec21
Location
Location: CZ/10/Prague, CZ/10, CZ
Loading map...

Important dates
Abstracts: 2021/08/09
Papers: 2021/08/16
Submissions: 2021/08/16
Notification: 2021/09/15
Camera ready due: 2021/09/22
Committees
General chairs: Branislav Bosansky, Cleotilde Gonzalez
Table of Contents

The conference proceedings will be published by Springer as part of the LNCS series.

Conference Topics include (but are not restricted to):

GameSec solicits research papers, which report original results and have neither been published nor submitted for publication elsewhere, on the following and other closely related topics:

  • Game theory, control, and mechanism design for security and privacy
  • Decision making for cybersecurity and security requirements engineering
  • Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure
  • Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems
  • Risk assessment and security risk management
  • Security and privacy of wireless and mobile communications, including user location privacy
  • Socio-technological and behavioral approaches to security
  • Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy
  • Adversarial Machine Learning and the role of AI in system security
  • Modeling and analysis of deception and antagonistic intrusion of information flow within a game-theoretic framework